Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following cooperative programs carried out by NIST provides a nationwide network of local centers offering technical and business assistance to small manufacturers

A.

NIST Laboratories

B.

Advanced Technology Program

C.

Manufacturing Extension Partnership

D.

Baldrige National Quality Program

Which of the following phases of DITSCAP includes the activities that are necessary for the continuing operation of an accredited IT system in its computing environment and for addressing the changing threats that a system faces throughout its life cycle

A.

Phase 1, Definition

B.

Phase 3, Validation

C.

Phase 4, Post Accreditation Phase

D.

Phase 2, Verification

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet

A.

UDP

B.

SSL

C.

IPSec

D.

HTTP

A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. What are the different types of policies Each correct answer represents a complete solution. Choose all that apply.

A.

Regulatory

B.

Advisory

C.

Systematic

D.

Informative

You work as a system engineer for BlueWell Inc. You want to verify that the build meets its data requirements, and correctly generates each expected display and report. Which of the following tests will help you to perform the above task

A.

Functional test

B.

Reliability test

C.

Performance test

D.

Regression test

Which of the following sections of the SEMP template defines the project constraints, to include constraints on funding, personnel, facilities, manufacturing capability and capacity, critical resources, and other constraints

A.

Section 3.1.5

B.

Section 3.1.8

C.

Section 3.1.9

D.

Section 3.1.7

Under which of the following CNSS policies, NIACAP is mandatory for all the systems that process USG classified information

A.

NSTISSP No. 11

B.

NSTISSP No. 101

C.

NSTISSP No. 7

D.

NSTISSP No. 6

Which of the following characteristics are described by the DIAP Information Readiness Assessment function Each correct answer represents a complete solution. Choose all that apply.

A.

It performs vulnerabilitythreat analysis assessment.

B.

It provides for entry and storage of individual system data.

C.

It provides data needed to accurately assess IA readiness.

D.

It identifies and generates IA requirements.

Lisa is the project manager of the SQL project for her company. She has completed the risk response planning with her project team and is now ready to update the risk register to reflect the risk response. Which of the following statements best describes the level of detail Lisa should include with the risk responses she has created

A.

The level of detail must define exactly the risk response for each identified risk.

B.

The level of detail is set of project risk governance.

C.

The level of detail is set by historical information.

D.

The level of detail should correspond with the priority ranking.

Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting classified information

A.

Type III cryptography

B.

Type III (E) cryptography

C.

Type II cryptography

D.

Type I cryptography